p0w Posted August 30, 2013 Share Posted August 30, 2013 Hi all, I have a problem with the psexec exploit. I scanned a target with nessus. Nessus found an unrestrictetd smb share. It even listed the content of the share. I tried to exploit the system with metasploits exploit/windows/smb/psexec without login credentials and the reverse meterpreter payload. The exploit failed. At first i thought windows may not accept connections from an unknown host without PW. But how could nessus read the content of the share? Any ideas? Greetings, P0w Quote Link to comment Share on other sites More sharing options...
digininja Posted August 30, 2013 Share Posted August 30, 2013 You need two things to be able to use psexec, the first is a share which you can upload your file to, the second is an account which you can ask to run the file. At the moment all you've done is upload a file to the machine which is just sitting there not doing anything. You'll need some kind of credentials to actually run the file once uploaded. Quote Link to comment Share on other sites More sharing options...
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.